CyberSec 2016 - The Fifth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic
Date2016-07-26 - 2016-07-28
Deadline2016-06-15
VenueManchester, UK - United Kingdom
KeywordsCyber Security; Cyber Warfare; Digital Forensic
Topics/Call fo Papers
**Cyber Security
- Distributed and Pervasive Systems Security
- Enterprise Systems Security
- Formal Methods Application in Security
- Hardware-Based security
- Incident Handling and Penetration Testing
- Legal Issues
- Multimedia and Document Security
- Operating Systems and Database Security
- Privacy issues
- SCADA and Embedded systems security
- Secure Software Development, Architecture and Outsourcing
- Security for Future Networks
- Security in Cloud Computing
- Security in Social Networks
- Security of Web-based Applications and Services
- Security protocols
- VOIP, Wireless and Telecommunications Network Security
**Digital Forensic
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Cyber-Crimes
- Data leakage, Data protection and Database forensics
- Evidentiary Aspects of Digital Forensics
- Executable Content and Content Filtering
- File System and Memory Analysis Multimedia Forensic
- Forensics of Virtual and Cloud Environments
- Information Hiding
- Investigation of Insider Attacks
- Large-Scale Investigations
- Malware forensics and Anti-Malware techniques
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
- New threats and Non-Traditional approaches
**Information Assurance and Security Management
- Business Continuity & Disaster Recovery Planning
- Corporate Governance
- Critical Infrastructure Protection
- Decidability and Complexity
- Digital Rights Management and Intellectual Property Protection
- Economics of Security
- Fraud Management
- Identity Management
- Laws and Regulations
- Security Policies and Trust Management
- Threats, Vulnerabilities, and Risk Management
**Cyber warfare and Physical Security
- Surveillance Systems
- Biometrics Applications
- Cyber Warfare Trends and Approaches
- Electronic Passports, National ID and Smart Card Security
- Social engineering
- Template Protection and Liveliness detection
- Authentication and Access Control Systems
- Biometrics standards and standardization
- New theories and algorithms in biometrics
- Distributed and Pervasive Systems Security
- Enterprise Systems Security
- Formal Methods Application in Security
- Hardware-Based security
- Incident Handling and Penetration Testing
- Legal Issues
- Multimedia and Document Security
- Operating Systems and Database Security
- Privacy issues
- SCADA and Embedded systems security
- Secure Software Development, Architecture and Outsourcing
- Security for Future Networks
- Security in Cloud Computing
- Security in Social Networks
- Security of Web-based Applications and Services
- Security protocols
- VOIP, Wireless and Telecommunications Network Security
**Digital Forensic
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Cyber-Crimes
- Data leakage, Data protection and Database forensics
- Evidentiary Aspects of Digital Forensics
- Executable Content and Content Filtering
- File System and Memory Analysis Multimedia Forensic
- Forensics of Virtual and Cloud Environments
- Information Hiding
- Investigation of Insider Attacks
- Large-Scale Investigations
- Malware forensics and Anti-Malware techniques
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
- New threats and Non-Traditional approaches
**Information Assurance and Security Management
- Business Continuity & Disaster Recovery Planning
- Corporate Governance
- Critical Infrastructure Protection
- Decidability and Complexity
- Digital Rights Management and Intellectual Property Protection
- Economics of Security
- Fraud Management
- Identity Management
- Laws and Regulations
- Security Policies and Trust Management
- Threats, Vulnerabilities, and Risk Management
**Cyber warfare and Physical Security
- Surveillance Systems
- Biometrics Applications
- Cyber Warfare Trends and Approaches
- Electronic Passports, National ID and Smart Card Security
- Social engineering
- Template Protection and Liveliness detection
- Authentication and Access Control Systems
- Biometrics standards and standardization
- New theories and algorithms in biometrics
Other CFPs
Last modified: 2015-11-28 00:46:19